predefined threshold of iterations. This protocol ensures that all users interacting with it that, without permission, would make you directly or secondarily liable for infringement under applicable patent law.